Chapter 5 - Issuer Trust Model
Chapter 5 - Issuer Trust Model
July 2022
EBSI, explained – first edition
What are the different chapters of this first edition?
Verifiable Verifiable Decentralised Digital Identity Issuers Trust Open ID Connect Digital Wallets
Credentials Credentials in Identifiers Model for Verifiable
Explained action (DID) Methods Credentials
05. EBSI Trust Models explained – Index
What are you going to learn in this chapter?
What are the How does EBSI’s Issuers What are the benefits of
most common Trust Trust Model work? EBSI’s Issuers Trust
Models of Issuers? Model?
4
The classical trust model for Issuers
Classic solutions often require Verifiers to contact Issuers in order to ensure that the information they receive from Holders can
be trusted. This pattern is called “phoning home”.
Credential Credential
Phoning Home
5
The “Phoning Home” problem
The need to “phone home” creates several challenges.
It places a technical burden on the It requires the Verifier to create and maintain It causes privacy challenges
credential Issuer, who needs to create calls to all those APIs from every credential because it provides a way for
and maintain APIs available to Issuer. In an open credential ecosystem, this issuers and Verifiers to correlate
Verifiers and ensure that connectivity could involve hundreds or thousands of an identity holder’s usage of a
is available 24x7. integrations for every relying party. credential across domains.
6
A new trust model for Issuers
According to EBSI’s Verifiable Credentials model, EBSI enables Verifiers to trust Issuers without “Phoning home”. Instead,
Verifiers can retrieve the information required to trust Issuers from EBSI’s ledger. This chapter provides detailed information
about how this is achieved.
Credential Credential
Ledger
7
Conceptual Trust Models of Issuers that avoid “phoning home”
There are three basic Trust Models of Issuers of Verifiable Credentials, these models can be combined.
Registry of Issuers
8
How does EBSI’s distributed Trust Model compare to others?
Trust models relevant in a C2G or C2B setting.
9
How does EBSI’s Issuers Trust
Model work?
10
Key actors of EBSI’s Issuers Trust Model
What are the key actors of EBSI’s Issuers Trust Model?
Accredits Issuers
DID DID
Registers schemas of Verifiable Registers Verifiable Accreditations
Credentials
11
How to establish trust between Issuers and Verifiers?
Understanding trust establishment in EBSI where numbers explain the sequence of events
3
Storage in
Accredi ts
5
Digital wallet
Registry of Issuers
DID
By rota ti ng/updating keys frequently, Issuers minimise the impact of an eventual compromise of their (private) key as less Verifiable Credentials will be signed with the
same key. Techni cally s peaking, the use of DIDs and DID documents enables Issuers to rotate their keys, i .e., to update their cryptographic keys regularly (e.g. every other
month) without i mpacting the Verifiers as they ca n easily retrieve the right version of the DID document from EBSI. This enables a much smoother and secure
management of keys in large ecosystems. Is s uers can have multiple active keys bound to their DID.
January February March April May June July August September October November December
{ { { { { {
Version 1
"@context": "https :/ / w3id.org/ did/ v1", Version 2
"@context": "https :/ / w3id.org/ did/ v1", Version 3
"@context": "https :/ / w3id.org/ did/ v1", Version 4
"@ context": "https :/ / w3id.org/ did/ v1", Version 5
"@context": "https :/ / w3id.org/ did/ v1", Version 6
"@context": "https :/ / w3id.org/ did/ v1",
"id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1",
"verificationMethod": [ " verificationMethod" : [ "verificationMethod": [ "verificationMethod": [ "verificationMethod": [ "verificationMethod": [
{ { { { { {
"id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1", "id": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1",
"type": "Ecds aSecp256k1VerificationKey2019", "type": "Ecds aSecp256k1VerificationKey2019", "type": "Ecds aSecp256k1VerificationKey2019", "type": "Ecds aSecp256k1VerificationKey2019", "type": "Ecds aSecp256k1VerificationKey2019", "type": "Ecds aSecp256k1VerificationKey2019",
"controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1", "controller": "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1",
"publicKeyJwk" : { "publicKeyJwk": { "publicKeyJwk": { "publicKeyJwk": { "publicKeyJwk": { "publicKeyJwk": {
"kty": "EC", " kty": "EC", "kty": "EC", "kty": "EC", "kty": "EC", "kty": "EC",
"crv": "s ecp256k1", " crv": "s ecp256k1", "crv": "s ecp256k1", "crv": "s ecp256k1", "crv": "s ecp256k1", "crv": "s ecp256k1",
"x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI" , "x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI", "x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI", "x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI", "x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI", "x": "n03trG -1s W idluyYQ2gcKrgYE94rMkLIArZCH jv2G pI",
"y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp- "y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp- "y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp- "y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp- "y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp- "y": "6__x_vqe0nBG Yf7azbQ1_VvvuCafG 5MhhU PN vYp-
Mak" Mak" Mak" Mak" Mak" Mak"
} } } } } }
} } } } } }
], ], ], ], ], ],
"authentication": [ " authentication": [ "authentication": [ "authentication": [ "authentication": [ "authentication": [
"did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" " did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys-1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1"
], ], ], ], ], ],
"as s ertionMethod" : [ " as s ertionMethod": [ "as s ertionMethod": [ "as s ertionMethod": [ "as s ertionMethod": [ "as s ertionMethod": [
"did:ebs i:zs SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" " did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys-1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1" "did:ebs i:z s SgDXeYPhZ3AuKhTFneDf1#keys -1"
] ] ] ] ] ]
} } } } } }
1 Public Key 2 Public Keys 3 Public Keys 4 Public Keys 5 Public Keys 6 Public Keys
In this case, the Issuer decides to update its keys every other month. This is done by registering a new version of the (Issu er’s) DID document on EBSI. Each version will therefore
contain an additional public key. The Verifier knows the DID of the Issuer and therefore it can resolve the latest DID Document from EBSI with the updated keyp air.
13
What is registered on the EBSI ledger?
What is registered on the EBSI ledger?
Trusted Issuers (TI) • DID and Document of Trusted Issuer • Verifiable Credential schema – describes data
• Issuer’s Verifiable Accreditation model for:
(including reference to DID, VCs they are Verifiable Credentials they are allowed to
allowed to issue and applicable jurisdiction, issue.
and corresponding schema). Note: the VC schema is determined at Use
case/policy level.
How to setup EBSI’s (multilevel) Issuers Trust Model?
Example: Education domain in Member State X
Level 1
Set-up of root TAO
Member State
EBSI Service Desk
Organisation
Request TAO to be authorised to issue accreditations in Authorises TAO to issue accreditations in the
the Education domain in a given country Education domain in the given country
Ministry of Education
(root TAO)
Level 2
Set-up of sub-TAOs
Accredits a (sub-)TAO to Accreditation Body
issue accreditations to for HEI* Accredits to Accredits to
Universities (sub-TAO) issue issue
Diplomas Diplomas
Level 3
Set-up of Issuers
Accredits Issuers to issue HEI A University A University B
Verifiable Credentials
e.g. Education Credential
and student ID
Issues a Issues a Issues a Issues a
diploma student ID diploma diploma
to a student to a student
Member State
Organisation
Requests Ministry of
1
Education to be registered
as a root TAO
4 Registers Verifiable
2 Generates and registers DID
Authorisation received
and DID document
from EBSI Service Desk
16
Workflow associated to Level 2 - Set-up of (sub-)TAO
Onboarding of (sub-)TAOs, this is optional
d Use-Case Group
Ministry of Education
(root TAO)
Confirmation of DID
2c University A (containing a reference to the
relevant Trusted Schema)
Holder
2b
ownership
Issues Verifiable
Generates and registers DID Registers the Verifiable Credential
1 2d
and DID document Accreditation received from
TAO
Trusted Accreditation
D. Accreditation to attest promotes a legal entity i nto a Trusted Issuer
D a ccredits Organisations (sub-
who ca n issue Verifiable Credentials according to the use-case policies.
TAO)
a ccredits
Trusted Issuers
i s sues Holder
Verifiable Credential
19
Technical note
On registration of Verifiable Authorisations and Verifiable Accreditations
20
What happens when the trust chain is set up?
Once the chain is set-up, EBSI enables Verifiers to easily verify whether the Issuer of a VC can be trusted
Verifiable
Accreditation
Holder Verifiable Credential(s)
references
Schema
21
What are the benefits of
the EBSI Issuers Trust Model?
22
A design that supports multiple trust-chains with use-case specific
structure and policies
23
Benefits of the EBSI’s distributed Trust Model
Easy to manage and to verify by design
24
Want to know more?
Key resources